The document was issued by academy or academy organization.
file
The interdependent nature of security on the Internet causes a negative externality that results in under-investment in technology-based defences. Previous research suggests that, in such an environment, cyber-insurers affect network security and user welfare. We utilize a general setting, where the network is populated by identical users with arbitrary risk-aversion and network security is costly for the users. In our model, a user's probability to incur damage (from being attacked) depends on both his security and the network security.
file
This paper studies manufacturer incentives to invest in the improvement of reliability and security of a software system when (i) reliability and security failures are caused by the same errors in the development of the software components and (ii) naive users find it too costly to distinguish between these two classes of system failures.We trace the effects of these informational imperfections and discuss how the resulting supply and demand externalities affect manufacturer investments.
file
What is it that pushes us to seek fame by misconduct or publicity by sharing embarrassing information with strangers? How do we reconcile these desires with the apparent need for privacy that surveys keep finding so widespread among the American population? In short, what drives individuals to reveal, and to hide, information about themselves to and from others?
file
This presentation looks at the following:
- Network monitoring and tomography
- Science of security: opportunities
file
A presentation made by Stephanie Forrest at the 2008 NSF/IARPA/NSA Workshop on the Science of Security at UC Berkeley.
file
The NSF/IARPA/NSA Workshop on the Science of Security was held November 17-18, 2008 in Berkeley, CA. This meeting brought together over 40 government and academic professionals from computer security and a wide variety of other relevant fields to consider the state of scientific research in computer security and to identify steps toward establishing a stronger scientific basis for computer system security.